نتایج جستجو برای: corruption synthetic data finally
تعداد نتایج: 2789713 فیلتر نتایج به سال:
there are two major theories of measurement in psychometrics: classical test theory (ctt) and item-response theory (irt). despite its widespread and long use, ctt has a number of shortcomings, which make it problematic to be used for practical and theoretical purposes. irt tries to solve these shortcomings, and provide better and more dependable answers. one of the applications of irt is the as...
Heap overflow is a prevalent memory corruption vulnerability, playing an important role in recent attacks. Finding such vulnerabilities in applications is thus critical for security. Many state-of-art solutions focus on runtime detection, requiring abundant inputs to explore program paths in order to reach a high code coverage and luckily trigger security violations. It is likely that the input...
RAID storage systems protect data from storage errors, such as data corruption, using a set of one or more integrity techniques, such as checksums. The exact protection offered by certain techniques or a combination of techniques is sometimes unclear. We introduce and apply a formal method of analyzing the design of data protection strategies. Specifically, we use model checking to evaluate whe...
Memory corruption attacks remain the primary threat for computer security. Information flow tracking or taint analysis has been proven to be effective against most memory corruption attacks. However, there are two shortcomings with current taint analysis based techniques. First, these techniques cause application slowdown by about 76% thereby limiting their practicality. Second, these technique...
We argue that two problems weaken the claims of those who link corruption and the exploitation of natural resources. The first is conceptual and the second is methodological. Studies that use national-level indicators of corruption fail to note that corruption comes in many forms, at multiple levels, that may affect resource use quite differently: negatively, positively, or not at all. Without ...
This paper examines how government regulation in developing countries affects the form of corruption between business customers and service providers in the telecom sector. We match the World Bank enterprise-level data on bribes with a unique crosscountry telecom regulation dataset collected by Wallsten et al. (2004), finding that (1) strong regulatory substance (the content of regulation) and ...
This chapter will examine and discuss the question whether conflicts of interest in the accountancy and auditing profession are conducive to corruption. In undertaking this enquiry, I will first define what a conflict of interest is and under what type of circumstances and conditions it can arise. The types of circumstances and conditions in which a conflict of interest arises will be illustrat...
Abstract: This paper explores the link between crime and corruption, compares their magnitudes, determinants and their effects on growth rates. The study uses a large cross country data set containing individual responses to questions on crime and corruption along with information on the respondents’ characteristics. This data set is supplemented by country level indicators from a variety of so...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید